Data Loss Prevention White Papers

Results 1 - 25 of 266Sort Results By: Published Date | Title | Company Name
By: RSA     Published Date: Sep 19, 2017

The General Data Protection Regulation (GDPR) has been approved by the European Union and demands significant data protection safeguards to be implemented by organizations around the world. Learn how you can successfully prepare for GDPR with advice from Osterman Research.

Tags : gdpr, data protection, rsa, rsa security, personal data, privacy, compliance, security policies
    
By: RSA     Published Date: Sep 19, 2017

This paper sets out five basic steps organizations may want to consider to help set up a framework for managing GDPR risk.

Tags : rsa, rsa security, data breach, data protection, gdpr, network security, compliance, email security
    
By: RSA     Published Date: Sep 19, 2017

This must-read report featuring insights from respected legal and security experts outlines specific GDPR compliance challenges you probably haven’t considered.

Tags : rsa, rsa security, gdpr, data protection, compliance, network security, internet security, intrusion detection
    
By: RSA     Published Date: Sep 19, 2017

Download the white paper to learn more about GDPR and its implications for your cybersecurity strategy.

Tags : rsa, rsa security, cybersecurity, data protection, compliance, eu compliance, gdpr, internet security
    
By: Thales     Published Date: Jul 13, 2017

Watch expert Nancy Spizzo for an informative recorded webinar, where she'll use real-world examples to highlight best practices and dispel myths about patient data protection. Spizzo will also discuss current trends in healthcare data security and HIPAA enforcement.

Tags : thales, data protection, health records, data security, hippa, hacker detection, intrusion prevention, best practices
    
By: Workday     Published Date: Jun 05, 2017

In today’s mobile, connected and data-driven world, legacy financial management systems are failing to meet the needs of the modern enterprise.

Tags : workday, finance management, mobile employees, mobile workers, mobile data, cloud finance, cloud hr, hr technology
    
By: Grey Matter     Published Date: Jan 13, 2017

This eBook shows how Grey Matter enables businesses to be more successful by offering the right solutions – to be more agile, more productive, and protected against threats to security and continuity – for today and tomorrow.

Tags : cloud, cloud computing, data, security, data security, data safe, cyber attacks, anti spam
    
By: Secureworks     Published Date: Nov 11, 2016

This paper sets out five major areas of focus for the practical CISO.

Tags : managed security services, ciso, security, risk management, security, threat and vulnerability management, vulnerability management, data loss prevention
    
By: Secureworks     Published Date: Nov 11, 2016

This paper takes an in-depth look at the true costs — both short and long term — of a data breach, and provides steps and tips that executive teams and security leaders can use to determine and reduce the true cost of a data breach.

Tags : managed security services, data breach, security, hackers, security, threat and vulnerability management, cost, hacker detection
    
By: Kaspersky     Published Date: Oct 26, 2016

Download our eBook Healthcare Ransomware: Hospitals on Hold to learn the measures your hospital or healthcare organization can put in place to ensure that this menace does not happen to you.

Tags : kaspersky, hospital records, healthcare security, secure data, cybercrime, hacker detection, intrusion detection, intrusion prevention
    
By: Lenovo     Published Date: Oct 14, 2016

IT rightly focuses on virtual data threats. But, how important are physical threats to your data? Explore the many physical threats your data and devices face in and out of the workplace, and find out how Lenovo can help you protect against them with devices built to be secure from the ground up. Get the eBook now.

Tags : security, usb, endpoint protection, theft, it threat, internet security, network security appliance, vulnerability management
    
By: VASCO Data Security International, Inc.     Published Date: Oct 06, 2016

This presentation details top trends in patient portal security along with the first steps and top considerations for piloting digital identity management programs within a healthcare organization.

Tags : vasco, identitiy management, portal security, patient security, password protection, cybersecurity, network security, authentication
    
By: Kaspersky     Published Date: Aug 17, 2016

Download our eBook to learn what you can expect from the oncoming wave of connected “things.”

Tags : kaspersky, iot, internet security, hackers, cybercrime, wireless security, network security, firewalls
    
By: Kaspersky     Published Date: Jul 22, 2016

Learn how you can maximize the performance and security of your virtualized machines.

Tags : kaspersky, virtual security, virtual environment, data breach, data protection, network security, email security, intrusion prevention
    
By: Kaspersky     Published Date: Jul 22, 2016

Do you have policies and plans in place to meet your user’s needs while keeping those devices—and your company’s sensitive information—secure?

Tags : kaspersky, byod, mobile device management, mobile workers, mobile security, remote security, mobile computing, smart phones
    
By: Kaspersky Lab Australia and New Zealand     Published Date: Jun 09, 2016

The volume and complexity of cyber-attacks targeting large enterprises and infrastructure service providers is escalating.

Tags : security application, data centers, data, cyber-attacks, security, prevent cyber-attacks, anti spam, anti spyware
    
By: HPE     Published Date: Jun 06, 2016

This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.

Tags : data, data recovery, data backup, midsized business, disaster recovery, data protection, database security, infrastructure
    
By: Riverbed     Published Date: May 19, 2016

Data protection, application performance, and business continuity are essential to staying competitive and profitable.

Tags : data, data protection, data centre, security, data security, application security, disaster recovery, security management
    
By: Kaspersky     Published Date: May 11, 2016

As a leader in cybercrime analysis, Kaspersky Lab’s GReAT (Global Research and Analysis) team has the answers to your questions in our new eBook, Cybercriminals: Unmasking the Villain, where you can find out such fascinating facts about the cybercrime world.

Tags : kaspersky, cybercrime, cyber attack, ddos, hackers, roi, security breach, firewall
    
By: Code42     Published Date: Apr 22, 2016

The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.

Tags : datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication
    
By: Code42     Published Date: Apr 22, 2016

Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.

Tags : endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection
    
By: Forcepoint     Published Date: Apr 20, 2016

The longer attackers remain in your network, the more lateral movement is possible and the greater the risk for data theft. Stopping the exfiltration of data, rather than focusing on stopping data breaches, is the most realistic approach to data security and reducing cyber dwell time.

Tags : cyber attack, security, security application, cybersecurity, cybersecurity, attack preventing, data security, access control
    
By: OpenText     Published Date: Apr 11, 2016

Read the Digital Clarity Group report for advice on how to initiate conversations internally about GDPR and questions you should ask your vendors to determine compliance levels.

Tags : opentext, gdpr, general data protection regulation, data. data inventory, network security, compliance, email security, security policies
    
By: IBM     Published Date: Apr 04, 2016

What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and country.

Tags : ibm, data breach, global, ponemon institute, knowledge management, enterprise applications, network security, data loss prevention
    
By: IBM     Published Date: Apr 04, 2016

What truly affects the cost of a data breach? Ponemon Institute’s latest study of 350 organizations around the globe details both the cost and impact of data breaches, with breakdowns by industry and in the United States.

Tags : ibm, data breach, united states, ponemon institute, knowledge management, enterprise applications, network security, data loss prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.